Monday, July 12, 2010

SIP trunking: A primer

  Testing NAT64 and DNS64 | Researchers tout new weapon in Internet censorship arms race
 
  Network World Cisco

Forward this to a Friend >>>


SIP trunking: A primer
A beginner's guide to SIP trunking Read More


E-BOOK: IBM

The IBM Guide to Smart Archive
The IBM Guide to Smart Archive is an interactive collateral and video tool that helps explain in a unique way IBM's Smart Archive strategy. Learn More

WEBCAST: Oracle

Getting Started with Identity Compliance
The Burton Group's, Kevin Kampman, provides an overview of the latest technology for identity management. He'll help you sift through key, mandatory requirements and features and functionality that can wait. Kevin offers guidance on how you can get a 360-degree view of users' access and behavior, best practices and a real-world implementation. View Now.

Testing NAT64 and DNS64
Due to the declining pool of available IPv4 addresses, service providers are motivated to find ways to convert their subscriber communications to IPv6. If they can do this they have an unlimited number of IPv6 addresses they can give to their subscribers. However, the vast majority of content and services remain IPv4-only. Therefore, methods to translate IPv6 packets to and from IPv4 packets are... Read More

Researchers tout new weapon in Internet censorship arms race
Trying to get out in front of what they call a censorship arms race, a team of researchers has come up with technology that lets users exchange messages through heavily censored networks in countries such as China and North Korea in hidden cha Read More


WHITE PAPER: Cisco

Learn the 3 Best Practices for Securing E-mail
Any IT manager will tell you it's critical to protect data. With information flowing freely today via mobile devices, collaboration technologies and unified communications, it isn't easy. Learn data leak prevention (DLP) triage and the steps to protect proprietary data in e-mail, while also complying with government and industry regulations. Read now!

Newest Attack on your Credit Card: ATM Shims
Shimming is the newest con designed to skim your credit card number, PIN and other info when you swipe your card through a reader like an ATM machine. The shim is the latest attack being used by criminals to steal your credit card info at the ATM or other Pin Entry Device. According to Diebold, " The criminal act of card skimming results in the loss of billions of dollars annually for financial institutions... Read More

Network security essentials
Network security problems are part of daily IT life these days. There are myriad issues, from patching Windows machines to stopping worms and protecting your assets from nasty insider threats. Here's a round up of the hottest recent network security news. Read More


WEBCAST: IBM

3 Reasons You Need a Comprehensive Smart Archive Strategy
Learn how enterprises can combine SAP and IBM's Smart Archive to craft content collection, archiving and compliance strategies. Learn More

Open-source hardware gadgets
The Touch Book tablet netbook from Always Innovating Inc. runs on the low-power ARM processor, which enables the device to run for 10 hours on a single battery charge. Weighing 1.8 pounds, it features a touch screen, a removable keyboard and a customized Linux OS distribution. Read More

Verizon to Use Cisco UC&C for cloud-based service trial
Verizon Business has announced it will become the first U.S.-based global service provider to deliver the Cisco unified communications and collaboration applications as a service, beginning with field trials of the new Cisco Hosted Collaboration Solution. The Cisco UC&C solution was announced in June at the CiscoLive! networking event held in Las Vegas; it is targeted to offer Cisco service provider and integrator partners with a wide range of Cisco collaboration applications to their customers via the cloud. Read More

US R&D: 27 Million Workers; $11 trillion in sales
US companies that performed or funded research and development domestically or in their overseas locations--employed 27.1 million workers worldwide in 2008, according to a new National Science Foundation report. The Read More

Military wants Holy Grail of secure encryption technology
It's a data encryption technology that protects sensitive data but at the same time lets computations be performed on it all without the data being decrypted. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

Computerworld and Network World: Best of Green IT

Computerworld and Network World: Best of Green IT Computerworld and Network World are teaming up to identify the top organizations leading the way with green-IT efforts and the coolest green-IT products. Computerworld will feature two ranked lists in its Oct. 25 issue: Top green-IT end-user organizations and a Top green-IT data center suppliers/vendors. Network World will feature the most effective green-IT products, as cited by survey respondents, in its Oct. 25 issue and online. Please fill out our short survey or forward this link to the person in your company best able to answer questions about IT energy issues. Surveys should be submitted by Thursday, July 1 at 12 noon EST.

SLIDESHOWS

Quiz: Do you know IT security?
Here is a quiz that draws questions from the vast spectrum of security options, including authentication, cryptograpy, firewalls, VPNs and more.

Your Next Laptop: Concept Designs Point the Way
Tomorrow's models may roll up, sport multiple screens or be repositionable, Transformer-style.

MOST-READ STORIES

  1. Military wants Holy Grail of secure encryption technology
  2. Cisco warns attendees that the Cisco Live database was hacked
  3. The best Windows 7 downloads
  4. Cisco Live 2010 attendees list hacked
  5. Cisco considers IOS for cert self study
  6. iPad invades corporate America
  7. Hackers edge toward unlocking iPhone 4 OS and network
  8. Movie 'Despicable Me' finds hero in behind-the-scenes technology
  9. VMware: no 'timeline' for release of delay-ridden hypervisor
  10. Poor SSL set-up can kill e-commerce

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cisco_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment